A lattice-based searchable encryption scheme with the validity period control of files

  • PDF / 601,111 Bytes
  • 18 Pages / 439.642 x 666.49 pts Page_size
  • 82 Downloads / 178 Views

DOWNLOAD

REPORT


A lattice-based searchable encryption scheme with the validity period control of files En Zhang1,2

· Yingying Hou1,2 · Gongli Li1,2

Received: 6 February 2020 / Revised: 17 August 2020 / Accepted: 16 September 2020 / © Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract In recent years, with the dramatic increase in the use of multimedia data, rapid retrieval and sharing of the multimedia data have become major trends. The validity period control function widely used in daily softwares, which enables multimedia data to be shared from a specific time and revokes the authorization of shared data at another specific time, thereby effectively enhancing the personalized experience of multimedia data users. At the same time, to protect privacy, databases usually store data in an encrypted form and use searchable encryption technology to retrieve keywords on the ciphertext to quickly extract the required multimedia data. However, the existing searchable encryption scheme cannot control the reading of multimedia data by using validity period. To solve this problem, we propose a lattice-based searchable encryption scheme with the validity period control of files. In order that the data owners have flexible and fine-grained control over the files, we convert the time information into a lattice vector for setting a different valid time for each file. Meanwhile, we embed the time information into the ciphertext, so that the data owner only needs to set the validity period once to automatically maintain the life cycle of the files over encrypted data, instead of manually withdrawing each expired file. Furthermore, we combine searchable encryption and time-distance so that our scheme returns valid files only if the keywords match correctly and the search time matches the file’s validity period. This scheme is a candidate for time-controlled searchable encryption technology in the postquantum era because our scheme constructed on learning with error (LWE) problem which has been proven to resist quantum attacks. Keywords Searchable encryption · Keyword search · LWE problem · Validity period control · Multimedia data

1 Introduction As the era of big data is coming, people enjoy the convenience brought by the rapid development of science and technology. However, people produce and use a large number of  En Zhang

[email protected]

Extended author information available on the last page of the article.

Multimedia Tools and Applications

multimedia files in work, study, medical, and all aspects of life, which leads to the fact that people’s local space is not large enough to store all the files, therefore the data storage becomes a serious problem. Cloud services are playing an increasingly important role in people’s lives. Not only can people outsource and store their files in the cloud, but they can also take advantage of the cloud’s powerful computing power to compute their data. Therefore, an increasing number of people choose to outsource data to the cloud, and more enterprises will no longer spend